Efficient anonymous roaming and its security analysis
The Canetti-Krawczyk (CK) model uses resuable modular components to construct indistinguishability-based key exchange protocols. The reusability of modular protocol components makes it easier to construct and prove new protocols when compared with other provably secure approaches. In this paper, we...
Saved in:
Main Authors: | YANG, Guomin, WONG, Duncan S., DENG, Xiaotie |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2005
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7439 https://ink.library.smu.edu.sg/context/sis_research/article/8442/viewcontent/Efficient_anonymous_roaming_and_its_security_analysis.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Anonymous and authenticated key exchange for roaming networks
by: YANG, Guomin, et al.
Published: (2007) -
Deposit-case attack against secure roaming
by: YANG, Guomin, et al.
Published: (2005) -
Universal authentication protocols for anonymous wireless communications
by: Yang, G., et al.
Published: (2014) -
A secure and effective anonymous user authentication scheme for roaming service in global mobility networks
by: WEN, Fengtong, et al.
Published: (2013) -
New efficient user identification and key distribution scheme providing enhanced security
by: YANG, Yanjiang, et al.
Published: (2004)